{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:54:32Z","timestamp":1769738072311,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["1629976"],"award-info":[{"award-number":["1629976"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409705","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:08:44Z","timestamp":1605042524000},"page":"505-517","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Heard it through the Gitvine: an empirical study of tool diffusion across the npm ecosystem"],"prefix":"10.1145","author":[{"given":"Hemank","family":"Lamba","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Asher","family":"Trockman","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Daniel","family":"Armanios","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Heather","family":"Miller","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Bogdan","family":"Vasilescu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Ritu Agarwal and Jayesh Prasad. 1997. The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences 28 3 ( 1997 ) 557-582.  Ritu Agarwal and Jayesh Prasad. 1997. The role of innovation characteristics and perceived voluntariness in the acceptance of information technologies. Decision Sciences 28 3 ( 1997 ) 557-582.","DOI":"10.1111\/j.1540-5915.1997.tb01322.x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/17.865899"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"ALFAA: Active Learning Fingerprint based Anti-Aliasing for correcting developer identity errors in version control systems. Empirical Software Engineering ( 2020 )","author":"Amreen Sadika","year":"2020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"James G Anderson and Stephen J Jay. 1985. The difusion of medical technology: Social network analysis and policy research. The Sociological Quarterly 26 1 ( 1985 ) 49-64.  James G Anderson and Stephen J Jay. 1985. The difusion of medical technology: Social network analysis and policy research. The Sociological Quarterly 26 1 ( 1985 ) 49-64.","DOI":"10.1111\/j.1533-8525.1985.tb00215.x"},{"key":"e_1_3_2_1_5_1","first-page":"21544","volume-title":"Proceedings of the National Academy of Sciences 106","author":"Aral Sinan","year":"2009"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Frank M Bass. 1969. A new product growth for model consumer durables. Management Science 15 5 ( 1969 ) 215-227.  Frank M Bass. 1969. A new product growth for model consumer durables. Management Science 15 5 ( 1969 ) 215-227.","DOI":"10.1287\/mnsc.15.5.215"},{"key":"e_1_3_2_1_8_1","volume-title":"Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, and Dawson Engler.","author":"Bessey Al","year":"2010"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950325"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/280765.280786"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1086\/421787"},{"key":"e_1_3_2_1_12_1","volume-title":"School superintendents and adoption of modern math: a social structure profile. Innovation in education","author":"Carlson Richard O","year":"1964"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Frank KY Chan and James YL Thong. 2009. Acceptance of agile methodologies: A critical review and conceptual framework. Decision Support Systems 46 4 ( 2009 ) 803-814.  Frank KY Chan and James YL Thong. 2009. Acceptance of agile methodologies: A critical review and conceptual framework. Decision Support Systems 46 4 ( 2009 ) 803-814.","DOI":"10.1016\/j.dss.2008.11.009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMsa066082"},{"key":"e_1_3_2_1_15_1","volume-title":"Applied multiple regression\/correlation analysis for the behavioral sciences","author":"Cohen Patricia"},{"key":"e_1_3_2_1_16_1","volume-title":"Leveraging transparency","author":"Dabbish Laura","year":"2012"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13835-0_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884812"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387478"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Paul J DiMaggio and Walter W Powell. 1983. The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review ( 1983 ) 147-160.  Paul J DiMaggio and Walter W Powell. 1983. The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields. American Sociological Review ( 1983 ) 147-160.","DOI":"10.2307\/2095101"},{"key":"e_1_3_2_1_22_1","unstructured":"Robert G Fichman and Chris F Kemerer. 1993. Adoption of software engineering process innovations: The case of object orientation. Sloan Management Review 34 ( 1993 ) 7-7.  Robert G Fichman and Chris F Kemerer. 1993. Adoption of software engineering process innovations: The case of object orientation. Sloan Management Review 34 ( 1993 ) 7-7."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"James H Fowler and Nicholas A Christakis. 2008. Dynamic spread of happiness in a large social network: longitudinal analysis over 20 years in the Framingham Heart Study. BMJ 337 ( 2008 ) a2338.  James H Fowler and Nicholas A Christakis. 2008. Dynamic spread of happiness in a large social network: longitudinal analysis over 20 years in the Framingham Heart Study. BMJ 337 ( 2008 ) a2338.","DOI":"10.1136\/bmj.a2338"},{"key":"e_1_3_2_1_24_1","unstructured":"Jay Galbraith. 1973. Designing complex organizations. ( 1973 ).  Jay Galbraith. 1973. Designing complex organizations. ( 1973 )."},{"key":"e_1_3_2_1_25_1","volume-title":"Use and misuse of continuous integration features: An empirical study of projects that (mis) use Travis CI","author":"Gallaba Keheliya","year":"2018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Jacob Goldenberg Barak Libai and Eitan Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters 12 3 ( 2001 ) 211-223.  Jacob Goldenberg Barak Libai and Eitan Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters 12 3 ( 2001 ) 211-223.","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. International Conference on Machine Learning. 666-674","author":"Gomez-Rodriguez Manuel","year":"2013"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. International Conference on Mining Software Repositories (MSR). IEEE, 12-21","author":"Gousios Georgios","year":"2012"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1086\/226707"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518803"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Morten T Hansen. 1999. The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits. Administrative Science Quarterly 44 1 ( 1999 ) 82-111.  Morten T Hansen. 1999. The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits. Administrative Science Quarterly 44 1 ( 1999 ) 82-111.","DOI":"10.2307\/2667032"},{"key":"e_1_3_2_1_32_1","article-title":"Investigating determinants of software developers' intentions to follow methodologies","volume":"20","author":"Hardgrave Bill C","year":"2003","journal-title":"Journal of Management Information Systems"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1108\/08858629910254157"},{"key":"e_1_3_2_1_35_1","volume-title":"Christophe Van den Bulte, and Thomas W Valente","author":"Iyengar Raghuram","year":"2011"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297964"},{"key":"e_1_3_2_1_37_1","volume-title":"Survival analysis. Unpublished manuscript","author":"Jenkins Stephen P","year":"2005"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950304"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_1_40_1","volume-title":"Proc. AMCIS ( 1999 ), 197","author":"Johnson Richard","year":"1999"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00060"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405329"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Lauren Lanahan and Daniel Armanios. 2018. Does more certification always benefit a venture? Organization Science 29 5 ( 2018 ) 931-947.  Lauren Lanahan and Daniel Armanios. 2018. Does more certification always benefit a venture? Organization Science 29 5 ( 2018 ) 931-947.","DOI":"10.1287\/orsc.2018.1211"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00031"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048237.2048241"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509515"},{"key":"e_1_3_2_1_48_1","volume-title":"Survival analysis","author":"Miller Rupert G"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115621"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Mark R Montgomery and John B Casterline. 1998. Social networks and the difusion of fertility control. ( 1998 ).  Mark R Montgomery and John B Casterline. 1998. Social networks and the difusion of fertility control. ( 1998 ).","DOI":"10.31899\/pgy6.1020"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368146"},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW). ACM, 405-414","author":"Murphy-Hill Emerson","year":"2011"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00059"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Ramana Nanda and Jesper B S\u00f8rensen. 2010. Workplace peers and entrepreneurship. Management Science 56 7 ( 2010 ) 1116-1126.  Ramana Nanda and Jesper B S\u00f8rensen. 2010. Workplace peers and entrepreneurship. Management Science 56 7 ( 2010 ) 1116-1126.","DOI":"10.1287\/mnsc.1100.1179"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0266(199707)18:1 <187::AID-SMJ936>3.3.CO;2-B"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1976.4408661"},{"key":"e_1_3_2_1_57_1","unstructured":"Jefrey Pfefer and R Gerald. 1978. Salancik. 1978. The external control of organizations: A resource dependence perspective.  Jefrey Pfefer and R Gerald. 1978. Salancik. 1978. The external control of organizations: A resource dependence perspective."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/RCoSE.2017.8"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Colin Renfrew. 1989. The origins of Indo-European languages. Scientific American 261 4 ( 1989 ) 106-115.  Colin Renfrew. 1989. The origins of Indo-European languages. Scientific American 261 4 ( 1989 ) 106-115.","DOI":"10.1038\/scientificamerican1089-106"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227188"},{"key":"e_1_3_2_1_61_1","volume-title":"Difusion of innovations","author":"Rogers Everett M"},{"key":"e_1_3_2_1_62_1","unstructured":"Everett M Rogers and D Lawrence Kincaid. 1981. Communication networks: Toward a new paradigm for research. ( 1981 ).  Everett M Rogers and D Lawrence Kincaid. 1981. Communication networks: Toward a new paradigm for research. ( 1981 )."},{"key":"e_1_3_2_1_63_1","unstructured":"Bryce Ryan and Neal C Gross. 1943. The difusion of hybrid seed corn in two Iowa communities. Rural Sociology 8 1 ( 1943 ) 15.  Bryce Ryan and Neal C Gross. 1943. The difusion of hybrid seed corn in two Iowa communities. Rural Sociology 8 1 ( 1943 ) 15."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.76"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13054-0_23"},{"key":"e_1_3_2_1_66_1","volume-title":"Institutional conditions for difusion","author":"Strang David","year":"1993"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1086\/230318"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.3102\/0034654308325896"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080331"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00014"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115668"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660339"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180209"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227190"},{"key":"e_1_3_2_1_75_1","volume-title":"Network models of the difusion of innovations","author":"Valente Thomas W","year":"1996"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2015.77"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Bogdan Vasilescu Alexander Serebrenik Mathieu Goeminne and Tom Mens. 2014. On the variation and specialisation of workload? A case study of the Gnome ecosystem community. Empirical Software Engineering 19 4 ( 2014 ) 955-1008.  Bogdan Vasilescu Alexander Serebrenik Mathieu Goeminne and Tom Mens. 2014. On the variation and specialisation of workload? A case study of the Gnome ecosystem community. Empirical Software Engineering 19 4 ( 2014 ) 955-1008.","DOI":"10.1007\/s10664-013-9244-1"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786850"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330195"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338922"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.13"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786816"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"crossref","unstructured":"Jiacheng Wu Forrest W Crawford David A Kim Derek Staford and Nicholas A Christakis. 2018. Exposure hazard and survival analysis of difusion on social networks. Statistics in Medicine 37 17 ( 2018 ) 2561-2585.  Jiacheng Wu Forrest W Crawford David A Kim Derek Staford and Nicholas A Christakis. 2018. Exposure hazard and survival analysis of difusion on social networks. Statistics in Medicine 37 17 ( 2018 ) 2561-2585.","DOI":"10.1002\/sim.7658"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531722"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2157"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236033"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.55"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409705","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:40Z","timestamp":1750203880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409705"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":86,"alternative-id":["10.1145\/3368089.3409705","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409705","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}